Digital Signature

Hassenstein Thema 4

Hassenstein Thema 4


Set of flashcards Details

Flashcards 33
Language English
Category Computer Science
Level University
Created / Updated 03.01.2019 / 31.01.2019
Weblink
https://card2brain.ch/box/20190103_digital_signature
Embed
<iframe src="https://card2brain.ch/box/20190103_digital_signature/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

Recap: What do certificates provide?

- integrity

- authentication

- non-repudiation

Recap: Why are digital signatures important?

And what can be signed? (at least 3 answers)

- PDF, MS-Word

- XML docs

- emails

- image-/binary-files

Recap: Tell the 3 most common algorithms to create a digital signature?

- RSA

- DSA

- ECDSA

Recap: What part of a message is singed?

And which hashing algorithm family should be used?

 

- the message digest (rather than the message itself)

- SHA-2, SHA-3

Recap: What must a Digital Certificate include? (4 answers)

- bind public key to identity

- Path Validation up to root CA / Log Verification (CT-log)

- CP/CPS Policy (for what the cert should be used - ex. encryption, authentication or signing)

- Web Trust (http://www.webtrust.org/item64428.aspx) -->can provide assurance services to evaluate and test whether the services provided by a particular Certification Authority meet these principles and criteria.

CMS (Cryptographic Message Syntax) SignedData:

in which notation the CMS is presented?

what contains a cms signed message? (3 parts)

- ASN.1

 

- digital signature (encrypted hash)

- infromation about the signer (subject name

- serial number

PDF Signature Standard:

What is serial signing of PDFs?

What components are interanlly used for signing?

- serial signing is where each signature comprises the prveious signatures

- PKCS#7 and CMS

Signature in PDF

When a PDF is signed as below, is this signature embedded or is this a separate file?

What parts of the PDF can be signed

- it is embedded

- signature value may also include additional information such as a signature graphic a time stamp and other data

PGP Signature - has its own format, syntax and encoding

what can be signed?

- files and emails

XML Digital Signature

What can signature referecnes point to? (4 answers)

- child

- parent

- sibling

- other file

What type of XML signatures exist? (3 answers)

- enveloping

- enveloped

- detached

What can XML-D-Sig be used for? (2 examples)

- SOAP (Simple Object Access Protocol) - SOAP messages are ordinary XML documents, uses HTTP for transmission, uses WSS to encypt or sign

- SAML (Security Assertion Markum Language) - for exchanging authentication and authorization assertions, SAML is XML-based where requests and responses usually are singed

 

JSON Web Signature (JWS) what does it represent and what 3 main parts does it have?

- represents content secured with digital signatures or MACs using JSON based data structures

- 3 main pars:

 - Header - parameter descriging the crypto operations and

 - Payload - sequence of octets secured

 - Signature - digital signature or MAC over header and payload

OAuth 2.0 what does it provide?

Open Id Connect extends OAuth with what?

- token to authorize calls to back-end resources

- adding an authentication and identity layer providing information about the end-user

Electronic Signature vs. digital signature.

What is the difference?

- ES -> a legal non-technica term, includes also non-crypto procedures as scanned handwritten signature

- DS -> Based on crypto algorithms, generates a temperproof representation of the data (integrity), enables proving of data origin (sender/author), 

Advanced electronic signature  (AdES) what does it provide? (2 properties)

(in CH AdES have no direct legal impact but they may increase provative value (Beweiskraft))

- data originality

- data integrity

QES (Qualified Electronic Signature)

Who has to create it?

What's the difference to AdES? (2 answers)

- ESCD qualified signature creation device

- it is has strong legal provative value and it's non-reputable (like handwritten signature)

Batch signature what can be done with this type of signature?

What should be kept in mind?

- sign multiple files with activating the private key only once

- the activation data PIN is cached for specific time / number of signatures

What is a digital timestamp?

What does it increase or support?

- a digitally signed attestation (Beglaubigung, Bescheinigung) provided by trustworthy service which confirms that certain data have been present at a specific time

- it increases level of probative value (beweiskraft) and non-repudation, also often very helpful to have a timestamp as such

Recap Timestamp Protocol (TSP)

What is signed?

What is sent back by TSA?

- always the hash --> hash of data, hash of data and timestamp, hash 

- singed hash concatenated with timestamp

Long Term Validation (LTV)

What is this used for?

Why do we request LTV?

By which means can LTV be fulfilled?

- All revocation information, certificate chain and timestamps necessary to validate a
signature will be included in the document or data, even though they normally can be
obtained during signature validation. So even if the certificate issuer were to cease to
exist, it is still possible years later to know that at the third-party confirmed point in time
of signing, the signing certificate itself and the corresponding chain was good.

- At any time in the future it must be possible to validate a signed
document to confirm that the signature was valid at the time it was
signed – a concept known as Long-Term Validation (LTV).

- it needs revocation infromation, certificate chain and timestamp

Long Term Archiving (LTA)

What is LTA used for?

- Digital signed documents must also be archived for a
long time – even many decades. At any time in the future,
in spite of technological and other advances, it must be
possible to confirm that the signature is still valid and
tamperproof.

Due to the aging process of key material (computing
power) or cryptographic algorithm (findings in
cryptanalysis) an initially secure signature may get weak. -> due to that QES may loose its provative value -> should be resigned

What does the eIDAS (electronic IDentification authentication and signature) and ETSI (European Telecommunication Standards Institute) provide?

- they provide trust and confidence in electronic transactions and publishes standards for trust services providers, electronic signatures and electronic seals / time-stamps

What are the 4 baselines of the three main ETSI standards used for high-value signatures (XAdES, PAdES, CAdES)?

- Zusammenfassung der Baselines:
- B: SignedInfo, SignatureValue, KeyInfo and SignedProperties
- T: timestamp
- LT: longterm
- LTA: longterm with archive timestamp

- BASELINE-B: (Basic Electronic Signature) the lowest and simplest version just
containing the SignedInfo, SignatureValue, KeyInfo and SignedProperties. This level
combines the old -BES and -EPES levels. This form extends the definition of an
electronic signature to conform to the identified signature policy.


- BASELINE-T: (Signature timestamp) A timestamp regarding the time of signing is
added to protect against repudiation.


- BASELINE-LT: (Long Term level) Certificates and revocation data are embedded to
allow verification in future even if their original source is not available. This level is
equivalent to the old XL level.


- BASELINE-LTA: (Long Term with Archive timestamp) By using periodical timestamping
(e.g. each year) compromising is prevented which could be caused by
weakening previous signatures during a long-time storage period. This level is
equivalent to the old -A level.

What for is the Swiss Electronic Signature Act (ZertES)?

- an electronical identity for all swiss citizen

What legal imlications does the ZertES have?

- same legal impl. as a handwritten signature

As with eIDAS (electronic IDentification authentication signature) with ZertES it allows it to enhance its legal imlication through what?

And what device is used to create such signature?

Where is such a signature attached?

Who can such a qualified certificate be issued to?

- same as AdES (advancedelectronic signature) it allows to enhance its legal implication trhough a regulated and qualified electronic signautre (QES)

- secure signature creation device (SSCD)

- to a qualified certificate

- to a natural person

When such a ZertES is attached to a X509 Cert, what fields must be modified?

► authorityKeyIdentifier: Identifier of the CSP‘s key,
which signed the certificate.
► keyUsage (Critical): Purpose of the key →
contentCommitment = nonRepudiation

Dass eine CSP solche ZertEs austellen kann, muss sie was bestehen?

- Einem Audit von SAS (Schweizerische Akkreditierungsstelle

Im folgenden Bild könnt ihr den Ablauf von ZertES sehen und was voneinander abhängig ist.

Ist der grüne Bereich mit einer handschriftlichen Unterschrift gleichzustellen?

Kann ein qualified certificate auch an eine Firma ausgestellt werden?

- Nein, erst das qualified certificate (unten rechts) ist mit dem gleichzustellen?

- Nein, dies kann nur an natürlich Personen ausgestellt werden.

Ich will nun einen Vertrag online und rechtskräftig Unterschreiben, welchen CertType brauche ich?

Und welche KeyUsage ist nötig?

- Qualified Certificate

- contentCommitment

What is PKCS#11?

Was ist MS CAPI?

Was ist der Unterschied zwischen Local und Remot Signing?

- Dies ist ein Standard für die Public Key crypto, welche die Schnittstelle von OS zur Crypto Hardware darstellt, mit welcher man entsprechend keys/certs brauchen, erstellen, löschen, modifizieren kann.

- dasselbe wie oben für Microsoft ;-)

- Bei Local Signing wird ein lokales physisches z.B. Token verwendet, um mittels keys/certs daten zu signieren. Bei Remote Signing übernimmt ein Server das Signieren

TW4S (Trustworthy System Supporting Server Signing) generate advanced electronic signatures -> auf der rechten Seite unser TSP.

Was generiert dieser Service (Server Signing Application) für uns?

Was ist das HSM?

Was wird an den User retourniert?

- er signiert Dokumente für uns

- hardware security module -> es hält die keys und macht die kryptographischen Operationen

- Ein Dokument und deren signatur.